Security & Trust

Security built for Private AI

frenzy.bot runs on dedicated private infrastructure with data isolation, TLS-encrypted connections, encrypted secrets storage, and strict access controls so your knowledge never leaks.

Private Architecture, End to End

Your AI stack is isolated by design: dedicated infrastructure, encrypted secrets, hardened servers, and audited access across every layer.

Encryption & Transport

TLS-encrypted connections (1.2+) with auto-provisioned Let's Encrypt certificates and hardened nginx headers (HSTS, X-Frame-Options, CSP). Sensitive credentials encrypted at rest using Fernet symmetric encryption.

Isolated Data Planes

Each client runs in its own private RAG silo with strict access boundaries.

Auditable Trails

Every sync, query, and admin action is logged for compliance reviews.

Server Hardening

SSH port randomization, UFW firewall with deny-all default policy, kernel-level network tuning, Docker port isolation, and server token suppression on every deployment.

Private Stack Layers
Private Application Layer
Isolated Vector Memory
Encrypted Secrets Store

Why Teams Trust frenzy.bot

Built for regulated teams that need strong guarantees without slowing down.

You Own the Data

All documents, embeddings, and logs stay on your infrastructure and under your control.

Private RAG Silos

No shared indexes. Each organization gets its own sealed knowledge base.

Role-Based Access

Granular permission system with custom roles, per-module access controls, and team management for enterprise admins. Bcrypt password hashing with per-user salts.

AI Privacy

Queries are routed through OpenRouter to third-party LLMs. Your data is never used to train or fine-tune models. LLM providers process prompts transiently under their own zero-retention data handling policies.

Trust Roadmap

Enterprise-grade controls and certifications on a clear schedule.

SAML/SSO

Single sign-on and IdP integrations for centralized access.

SOC 2 Type II

Controls and audit program aligned with SOC 2 requirements.

Private Cloud Regions

Regional private deployments with data residency options.

Security Strategy

Need a security review?

We provide architecture notes, threat model walkthroughs, and compliance documentation for your team.